SlideShare ist ein Scribd-Unternehmen logo
1 von 69
NETWORK ADMINISTRATION LINUX PREVIEW
The Virtual File System Structure ,[object Object],[object Object],[object Object],[object Object]
Hệ thống tập tin EXT2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I-Node and Data block in EXT2 FS
I-Node and Data block in EXT2 FS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I-Node and Data block in EXT2 FS ,[object Object],[object Object],[object Object],[object Object]
Directories in EXT2 FS Directories are implemented as a special type of files . Actually, a  directory is a file containing a list of entries . Each entry contains an  inode number  and a  file name .
Link (Liên kết)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Link (Liên kết)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hard Link – Symbolic Link ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Permissions The first item, which specifies the file type, can show one of the following:  d   : a directory  -  (dash)   : a regular file (rather than directory or link)  l   : a symbolic link to another program or file Beyond the first item, in each of the following three sets, you will see one of the following:  r   : file can be read  w   : file can be written to  x   : file can be executed (if it is a program)   -  ( rw- )  ( rw- )  ( r-- )  1  sam  sam  |  |  |  | Type  owner   group   others
Using File System Commands  chmod ,[object Object],[object Object],[object Object]
Chmod : Using a flag method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chmod : Using a flag method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Changing Permissions With Numbers ,[object Object],[object Object],[object Object],[object Object],[object Object],For  sneakers.txt , here are the numerical permissions settings:   -  ( r w - )  ( r w - )  ( r - - )  |  |  |    4+2+0  4+2+0  4+0+0
Changing Permissions With Numbers ,[object Object],[object Object]
Changing Permissions With Numbers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Lệnh umask : Quyền hạn mặc định ví dụ :  file.txt  có quyền hạn mặc định là  664  ;    folder  là  775
Lệnh umask : Quyền hạn mặc định ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sticky bit ,[object Object],[object Object],[object Object]
Sticky bit ,[object Object],[object Object]
The Root Directory ,[object Object]
Running Programs at Boot Time ,[object Object],[object Object]
Users and Groups ,[object Object],[object Object],[object Object],[object Object],[object Object]
User and Group Management Tools ,[object Object],[object Object],[object Object],[object Object]
[object Object]
Adding a User ,[object Object],[object Object],[object Object]
The command line options for useradd  ,[object Object],[object Object],[object Object],[object Object],[object Object]
The command line options for useradd  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Delete a user account - userdel ,[object Object],[object Object],[object Object]
Modify a user account - usermod ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modify a user account - usermod ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modify a user account - usermod ,[object Object],[object Object],[object Object],[object Object]
change Command Line Options  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adding a Group ,[object Object],[object Object]
User Private Groups ,[object Object],[object Object],[object Object],[object Object]
Group Directories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
/etc/passwd ,[object Object],[object Object],[object Object],[object Object],[object Object]
/etc/passwd ,[object Object],[object Object],[object Object],[object Object],[object Object]
/etc/shadow ,[object Object],[object Object],[object Object]
/etc/shadow ,[object Object],[object Object],[object Object]
Linux Networking
Determining Your IP Address  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Changing Your IP Address ,[object Object],[object Object],[object Object],[object Object]
Interface Configuration Files  ,[object Object],[object Object]
Example configuration file ,[object Object],[object Object],[object Object],[object Object]
the configurable parameters in an Ethernet interface configuration file   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
the configurable parameters in an Ethernet interface configuration file ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interface Control Scripts  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How To Change Your Default Gateway  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
/etc/sysconfig/network  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To Change The Duplex Setting Of Your NIC ,[object Object],[object Object],[object Object],[object Object]
To Change The Duplex Setting Of Your NIC ,[object Object],[object Object],[object Object]
Configuring Your /etc/hosts File ,[object Object],[object Object],[object Object],[object Object]
Configuring Your /etc/hosts File ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Loopback Interface's Localhost Entry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GUI Network Configuration ,[object Object],[object Object]
Overview  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Establishing an Ethernet Connection  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Establishing an Ethernet Connection ,[object Object],[object Object]
Establishing an Ethernet Connection ,[object Object]
Establishing an Ethernet Connection ,[object Object],[object Object],[object Object],[object Object]
Managing DNS Settings
Managing Hosts
Managing Hosts ,[object Object],[object Object]
Activating Devices  ,[object Object],[object Object]
Activating Devices
Device Aliases  ,[object Object],[object Object],[object Object],[object Object]
Activating Devices To verify that the alias has been activated, use the command ifconfig. The output should show the device and the device alias with different IP address

Weitere ähnliche Inhalte

Was ist angesagt?

101 2.4 use debian package management
101 2.4 use debian package management101 2.4 use debian package management
101 2.4 use debian package management
Acácio Oliveira
 
101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems
Acácio Oliveira
 

Was ist angesagt? (19)

101 2.4 use debian package management
101 2.4 use debian package management101 2.4 use debian package management
101 2.4 use debian package management
 
101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
 
Know the UNIX Commands
Know the UNIX CommandsKnow the UNIX Commands
Know the UNIX Commands
 
intro unix/linux 02
intro unix/linux 02intro unix/linux 02
intro unix/linux 02
 
Linux
Linux Linux
Linux
 
linux-commandline-magic-Joomla-World-Conference-2014
linux-commandline-magic-Joomla-World-Conference-2014linux-commandline-magic-Joomla-World-Conference-2014
linux-commandline-magic-Joomla-World-Conference-2014
 
Basic Linux
Basic LinuxBasic Linux
Basic Linux
 
Basic Unix
Basic UnixBasic Unix
Basic Unix
 
Introduction to UNIX Command-Lines with examples
Introduction to UNIX Command-Lines with examplesIntroduction to UNIX Command-Lines with examples
Introduction to UNIX Command-Lines with examples
 
intro unix/linux 09
intro unix/linux 09intro unix/linux 09
intro unix/linux 09
 
Linux command for beginners
Linux command for beginnersLinux command for beginners
Linux command for beginners
 
58518522 study-aix
58518522 study-aix58518522 study-aix
58518522 study-aix
 
Lesson 3 Working with Files in Linux
Lesson 3 Working with Files in LinuxLesson 3 Working with Files in Linux
Lesson 3 Working with Files in Linux
 
intro unix/linux 11
intro unix/linux 11intro unix/linux 11
intro unix/linux 11
 
intro unix/linux 07
intro unix/linux 07intro unix/linux 07
intro unix/linux 07
 
Unix Command Line Productivity Tips
Unix Command Line Productivity TipsUnix Command Line Productivity Tips
Unix Command Line Productivity Tips
 
40 basic linux command
40 basic linux command40 basic linux command
40 basic linux command
 
Introduction to linux day-3
Introduction to linux day-3Introduction to linux day-3
Introduction to linux day-3
 

Andere mochten auch

Module 7 Sql Injection
Module 7   Sql InjectionModule 7   Sql Injection
Module 7 Sql Injection
leminhvuong
 
How to connect file server
How to connect file serverHow to connect file server
How to connect file server
Kichiemon Adachi
 

Andere mochten auch (18)

Proxy
ProxyProxy
Proxy
 
Module 7 Sql Injection
Module 7   Sql InjectionModule 7   Sql Injection
Module 7 Sql Injection
 
Net Admin Intro
Net Admin IntroNet Admin Intro
Net Admin Intro
 
NETWORK SERVICEOPENSSH + NTP + SQUID
NETWORK SERVICEOPENSSH + NTP + SQUIDNETWORK SERVICEOPENSSH + NTP + SQUID
NETWORK SERVICEOPENSSH + NTP + SQUID
 
Node.js x Azure, cli usage, website deployment
Node.js x Azure, cli usage, website deploymentNode.js x Azure, cli usage, website deployment
Node.js x Azure, cli usage, website deployment
 
Using Cloud Storage Gateways to Build a Cloud SAN
Using Cloud Storage Gateways to Build a Cloud SANUsing Cloud Storage Gateways to Build a Cloud SAN
Using Cloud Storage Gateways to Build a Cloud SAN
 
MariaDB: Connect Storage Engine
MariaDB: Connect Storage EngineMariaDB: Connect Storage Engine
MariaDB: Connect Storage Engine
 
How to connect file server
How to connect file serverHow to connect file server
How to connect file server
 
Net Ops Data Center Architecture Diagram 06
Net Ops Data Center Architecture Diagram 06Net Ops Data Center Architecture Diagram 06
Net Ops Data Center Architecture Diagram 06
 
Ch18
Ch18Ch18
Ch18
 
Rhce ppt
Rhce pptRhce ppt
Rhce ppt
 
Wire Less
Wire LessWire Less
Wire Less
 
File Sever
File SeverFile Sever
File Sever
 
Iptables
IptablesIptables
Iptables
 
Caching Strategies
Caching StrategiesCaching Strategies
Caching Strategies
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
2016 nas 年會簡報
2016 nas 年會簡報2016 nas 年會簡報
2016 nas 年會簡報
 
20 Hot Location-Based Apps and Services You Should Know About
20 Hot Location-Based Apps and Services You Should Know About20 Hot Location-Based Apps and Services You Should Know About
20 Hot Location-Based Apps and Services You Should Know About
 

Ähnlich wie Lession1 Linux Preview

Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
Dima Gomaa
 
4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands
Gautam Raja
 

Ähnlich wie Lession1 Linux Preview (20)

04-1-Linux.ppt
04-1-Linux.ppt04-1-Linux.ppt
04-1-Linux.ppt
 
File permissions
File permissionsFile permissions
File permissions
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
 
OS Unit IV.ppt
OS Unit IV.pptOS Unit IV.ppt
OS Unit IV.ppt
 
Programming Embedded linux
Programming Embedded linuxProgramming Embedded linux
Programming Embedded linux
 
FILE PERMISSION OR ACCESS MODE
 FILE PERMISSION OR ACCESS MODE FILE PERMISSION OR ACCESS MODE
FILE PERMISSION OR ACCESS MODE
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.ppt
 
File Input/output, Database Access, Data Analysis with Pandas
File Input/output, Database Access, Data Analysis with PandasFile Input/output, Database Access, Data Analysis with Pandas
File Input/output, Database Access, Data Analysis with Pandas
 
QSpiders - Unix Operating Systems and Commands
QSpiders - Unix Operating Systems  and CommandsQSpiders - Unix Operating Systems  and Commands
QSpiders - Unix Operating Systems and Commands
 
Basics of Linux
Basics of LinuxBasics of Linux
Basics of Linux
 
Basic Linux day 2
Basic Linux day 2Basic Linux day 2
Basic Linux day 2
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands
 
File Access Permission
File Access PermissionFile Access Permission
File Access Permission
 
Host security
Host securityHost security
Host security
 
Host security
Host securityHost security
Host security
 
40 basic linux command
40 basic linux command40 basic linux command
40 basic linux command
 
Operating System Practice : Meeting 4 - operasi file dan struktur direktori-s...
Operating System Practice : Meeting 4 - operasi file dan struktur direktori-s...Operating System Practice : Meeting 4 - operasi file dan struktur direktori-s...
Operating System Practice : Meeting 4 - operasi file dan struktur direktori-s...
 
Ai module
Ai module Ai module
Ai module
 

Mehr von leminhvuong

Lession3 Routing
Lession3 RoutingLession3 Routing
Lession3 Routing
leminhvuong
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
leminhvuong
 
Net Security Intro
Net Security IntroNet Security Intro
Net Security Intro
leminhvuong
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
leminhvuong
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
leminhvuong
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
leminhvuong
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
leminhvuong
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
leminhvuong
 
Socket Programming
Socket  ProgrammingSocket  Programming
Socket Programming
leminhvuong
 

Mehr von leminhvuong (20)

Dns
DnsDns
Dns
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Lession3 Routing
Lession3 RoutingLession3 Routing
Lession3 Routing
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
 
Net Security Intro
Net Security IntroNet Security Intro
Net Security Intro
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Call Back
Call BackCall Back
Call Back
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
 
Call Back
Call BackCall Back
Call Back
 
Call Back
Call BackCall Back
Call Back
 
Url Connection
Url ConnectionUrl Connection
Url Connection
 
Udp Programming
Udp ProgrammingUdp Programming
Udp Programming
 
Socket Programming
Socket  ProgrammingSocket  Programming
Socket Programming
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Lession1 Linux Preview

  • 2.
  • 3.
  • 4. I-Node and Data block in EXT2 FS
  • 5.
  • 6.
  • 7. Directories in EXT2 FS Directories are implemented as a special type of files . Actually, a directory is a file containing a list of entries . Each entry contains an inode number and a file name .
  • 8.
  • 9.
  • 10.
  • 11. Permissions The first item, which specifies the file type, can show one of the following: d : a directory - (dash) : a regular file (rather than directory or link) l : a symbolic link to another program or file Beyond the first item, in each of the following three sets, you will see one of the following: r : file can be read w : file can be written to x : file can be executed (if it is a program) - ( rw- ) ( rw- ) ( r-- ) 1 sam sam | | | | Type owner group others
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 65.
  • 66.
  • 68.
  • 69. Activating Devices To verify that the alias has been activated, use the command ifconfig. The output should show the device and the device alias with different IP address